open-nomad/command/sentinel_delete.go

82 lines
1.8 KiB
Go
Raw Normal View History

2017-09-19 14:47:10 +00:00
package command
import (
"fmt"
"strings"
"github.com/posener/complete"
)
type SentinelDeleteCommand struct {
Meta
}
func (c *SentinelDeleteCommand) Help() string {
helpText := `
Usage: nomad sentinel delete [options] <name>
2017-10-13 21:36:02 +00:00
Delete is used to delete an existing Sentinel policy.
2017-09-19 14:47:10 +00:00
Sentinel commands are only available when ACLs are enabled. This command
requires a management token.
2017-09-19 14:47:10 +00:00
General Options:
` + generalOptionsUsage(usageOptsDefault|usageOptsNoNamespace) + `
2017-09-19 14:47:10 +00:00
`
return strings.TrimSpace(helpText)
}
func (c *SentinelDeleteCommand) AutocompleteFlags() complete.Flags {
return mergeAutocompleteFlags(c.Meta.AutocompleteFlags(FlagSetClient),
complete.Flags{})
}
func (c *SentinelDeleteCommand) AutocompleteArgs() complete.Predictor {
return complete.PredictNothing
}
func (c *SentinelDeleteCommand) Synopsis() string {
return "Delete an existing Sentinel policies"
}
func (c *SentinelDeleteCommand) Name() string { return "sentinel delete" }
2017-09-19 14:47:10 +00:00
func (c *SentinelDeleteCommand) Run(args []string) int {
flags := c.Meta.FlagSet(c.Name(), FlagSetClient)
2017-09-19 14:47:10 +00:00
flags.Usage = func() { c.Ui.Output(c.Help()) }
if err := flags.Parse(args); err != nil {
return 1
}
// Check that we got exactly one arguments
args = flags.Args()
if l := len(args); l != 1 {
c.Ui.Error("This command takes one argument: <name>")
c.Ui.Error(commandErrorText(c))
2017-09-19 14:47:10 +00:00
return 1
}
// Get the name and file
policyName := args[0]
// Get the HTTP client
client, err := c.Meta.Client()
if err != nil {
c.Ui.Error(fmt.Sprintf("Error initializing client: %s", err))
return 1
}
// Get the list of policies
_, err = client.SentinelPolicies().Delete(policyName, nil)
if err != nil {
c.Ui.Error(fmt.Sprintf("Error deleting Sentinel policy: %s", err))
return 1
}
c.Ui.Output(fmt.Sprintf("Successfully deleted %q Sentinel policy!",
policyName))
return 0
}